About Operations Sentinel Console

Operations Sentinel Console is an application provided with Operations Sentinel that allows you to complete administrative and operative tasks in one place. This is done through two modes— Administration and Operations. You can easily switch between these two modes. See About Administration Mode Tasks and About Operations Mode Tasks for information on the specific tasks you perform in these two modes.

A main feature of Operations Sentinel Console is the ability to define all servers, systems, and consoles in a single repository. This repository is called the Operations Sentinel data. Any change to the Operations Sentinel data needs to be made only once, and other users of Operations Sentinel Console see these changes as soon as they are saved. An Operations Sentinel administrator can then create subsets of the Operations Sentinel data that a user of Operations Sentinel Console can manage at one time. These subsets are called zones.

Additional features of Operations Sentinel Console include

See Operations Sentinel Console Window for information on the Operations Sentinel Console user interface.

Establishing Secure Connection to Operations Sentinel Server

To establish secure connection to Operations Sentinel server:

Operations Sentinel Roles

There are two predefined roles in Operations Sentinel Console: SPO Administrators and SPO Users. An Operations Sentinel administrator must be a member of the Windows local group SPO Administrators. An Operations Sentinel user must be a member of the Windows local group SPO Users.

A person in the SPO Administrators role can also add additional roles.

Users in the SPO Administrators role have full access to all features of the application. Users in the SPO Users role and any user-defined roles can do only what their permissions allow them to do.

Security Considerations

In Administration mode, only users in the SPO Administrators role have full access rights to view, create, and modify data. For users in other roles, their rights to create and modify data depend on the permissions granted to their role.